IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
References
Link | Resource |
---|---|
http://lambdaops.com/cross-origin-websocket-hijacking-of-ipython | Press/Media Coverage Technical Description |
http://permalink.gmane.org/gmane.comp.python.ipython.devel/13198 | Broken Link |
http://seclists.org/oss-sec/2014/q3/152 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1119890 | Issue Tracking |
https://github.com/ipython/ipython/pull/4845 | Patch Issue Tracking |
http://lists.opensuse.org/opensuse-updates/2014-08/msg00039.html | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:160 | Broken Link |
http://advisories.mageia.org/MGASA-2014-0320.html | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94497 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2014-08-07 11:13
Updated : 2018-10-30 16:27
NVD link : CVE-2014-3429
Mitre link : CVE-2014-3429
JSON object : View
Products Affected
mageia
- mageia
ipython
- ipython_notebook
opensuse
- opensuse
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')